首页 > 最新文献

2015 5th Nirma University International Conference on Engineering (NUiCONE)最新文献

英文 中文
Multibiometric template generation using CS theory and discrete wavelet transform based fusion technique 利用CS理论和基于离散小波变换的融合技术生成多生物特征模板
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449640
Rohit M. Thanki, K. Borisagar
Nowadays, two or more than two biometric traits or templates are used for individual verification by many institutions due to limitations of the unimodal biometric system. Two or more than two biometric templates are used for recognition by individuals in biometric system which is known as multibiometric system. The problem of generation of multibiometric template is associated with any multibiometric system designing. In this paper, fusion technique for generation of multibiometric template is proposed using compressive sensing theory and Discrete Wavelet Transform. In this technique, sparse measurements of fingerprint image are fused into diagonal wavelet coefficients of face image of the same individual to generate multibiometric template. The fused face image is used for individual recognition for decisions about verification. Defused sparse measurements of fingerprint image from fused face image and then reconstructed fingerprint image using CS recovery processes from extracted sparse measurements. This reconstructed fingerprint image is used for the second level of verification of individuals. This verification accuracy of face system fingerprint system and multibiometric system is above 80 % after application of the proposed fusion algorithm.
目前,由于单峰生物识别系统的局限性,许多机构使用两个或两个以上的生物特征或模板进行个体验证。在生物识别系统中,个体使用两个或两个以上的生物识别模板进行识别,称为多生物识别系统。多生物特征模板的生成问题与任何多生物特征系统的设计息息相关。本文提出了一种基于压缩感知理论和离散小波变换的多生物特征模板生成融合技术。该技术将指纹图像的稀疏测量值融合到同一个体人脸图像的对角小波系数中,生成多生物特征模板。融合后的人脸图像用于个体识别,以决定是否验证。从融合后的人脸图像中提取指纹图像的稀疏测量值,然后对提取的稀疏测量值进行CS恢复处理重建指纹图像。这种重建的指纹图像用于个人的第二级验证。应用该融合算法后,人脸系统、指纹系统和多生物识别系统的验证准确率均在80%以上。
{"title":"Multibiometric template generation using CS theory and discrete wavelet transform based fusion technique","authors":"Rohit M. Thanki, K. Borisagar","doi":"10.1109/NUICONE.2015.7449640","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449640","url":null,"abstract":"Nowadays, two or more than two biometric traits or templates are used for individual verification by many institutions due to limitations of the unimodal biometric system. Two or more than two biometric templates are used for recognition by individuals in biometric system which is known as multibiometric system. The problem of generation of multibiometric template is associated with any multibiometric system designing. In this paper, fusion technique for generation of multibiometric template is proposed using compressive sensing theory and Discrete Wavelet Transform. In this technique, sparse measurements of fingerprint image are fused into diagonal wavelet coefficients of face image of the same individual to generate multibiometric template. The fused face image is used for individual recognition for decisions about verification. Defused sparse measurements of fingerprint image from fused face image and then reconstructed fingerprint image using CS recovery processes from extracted sparse measurements. This reconstructed fingerprint image is used for the second level of verification of individuals. This verification accuracy of face system fingerprint system and multibiometric system is above 80 % after application of the proposed fusion algorithm.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hierarchical clustering technique for word sense disambiguation using Hindi WordNet 基于印地语WordNet的分层聚类语义消歧技术
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449621
Nirali Patel, Bhargesh Patel, Rajvi Parikh, Brijesh Bhatt
Word Sense Disambiguation (WSD) is crucial and its significance is prominent in every application of computational linguistics. WSD is a challenging problem of Natural Language Processing (NLP). Though there are lots of algorithms for WSD available, still little work is carried out for choosing optimal algorithm for that. Three approaches are available for WSD, namely, Knowledge-based approach, Supervised approach and Unsupervised approach. Also, one can use the combination of given approaches. Supervised approach needs large amounts of manually created sense-annotated corpus which takes computationally more amount of time and effort. Knowledge-based approach requires machine readable dictionaries, sense inventories, thesauri, etc, which are dependent on own interpretation about word's sense; Whereas unsupervised approach uses sense-unannotated corpus and it is based on the phenomenon of working that words that co-occur have similarity. This research is for Hindi language which uses Hierarchical clustering algorithm with different similarity measures which are cosine, Jaccard and dice, the result of clusters is overlapped with Hindi WordNet a product of IIT Bombay which improves result of word sense disambiguation as clustering does grouping of words which are similar.
词义消歧在计算语言学的各个应用中都是至关重要的。WSD是自然语言处理(NLP)中的一个具有挑战性的问题。虽然有很多针对WSD的算法,但是对于选择最优的WSD算法的研究还很少。水务署有三种方法,即以知识为基础的方法、监督方法和无监督方法。此外,还可以使用给定方法的组合。监督方法需要手工创建大量的语义标注语料库,这在计算上花费了更多的时间和精力。基于知识的方法需要机器可读的词典、词义清单、辞典等,这些都依赖于自己对单词词义的解释;而无监督方法使用无意义标注的语料库,它是基于共同出现的词具有相似性的工作现象。本研究以印地语为研究对象,采用余弦、Jaccard和dice三种不同相似度度量的分层聚类算法,聚类结果与IIT Bombay的产品印地语WordNet重叠,通过聚类对相似词进行分组,提高了词义消歧的结果。
{"title":"Hierarchical clustering technique for word sense disambiguation using Hindi WordNet","authors":"Nirali Patel, Bhargesh Patel, Rajvi Parikh, Brijesh Bhatt","doi":"10.1109/NUICONE.2015.7449621","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449621","url":null,"abstract":"Word Sense Disambiguation (WSD) is crucial and its significance is prominent in every application of computational linguistics. WSD is a challenging problem of Natural Language Processing (NLP). Though there are lots of algorithms for WSD available, still little work is carried out for choosing optimal algorithm for that. Three approaches are available for WSD, namely, Knowledge-based approach, Supervised approach and Unsupervised approach. Also, one can use the combination of given approaches. Supervised approach needs large amounts of manually created sense-annotated corpus which takes computationally more amount of time and effort. Knowledge-based approach requires machine readable dictionaries, sense inventories, thesauri, etc, which are dependent on own interpretation about word's sense; Whereas unsupervised approach uses sense-unannotated corpus and it is based on the phenomenon of working that words that co-occur have similarity. This research is for Hindi language which uses Hierarchical clustering algorithm with different similarity measures which are cosine, Jaccard and dice, the result of clusters is overlapped with Hindi WordNet a product of IIT Bombay which improves result of word sense disambiguation as clustering does grouping of words which are similar.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Leakage current reduction in finfet based 6T SRAM cell for minimizing power dissipation in nanoscale memories 纳米级存储器中最小化功耗的基于finet的6T SRAM单元漏电流降低
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449596
Vishal Gupta, V. Gupta, S. Khandelwal, B. Raj, R. Gupta
The power consumption of high performance integrated circuits has increased significantly with technology scaling. Higher power consumption shortens the battery lifetime of portable devices. Furthermore, the increased power consumption poses limitation on the continued technology scaling due to the associated higher power density. In this paper, the sources of power consumption are identified and modeled. Implementation of various techniques and the proposed technique for reducing total leakage current for low power SRAM cell is presented. It is observed in the paper that the total leakage current and power dissipation of the proposed technique is minimized to 52.89 fA and 4.75 nW respectively. Simulations have been performed on Cadence virtuoso 45 nm technologies.
高性能集成电路的功耗随着技术的规模化而显著增加。更高的功耗缩短了便携式设备的电池寿命。此外,由于相关的更高功率密度,功率消耗的增加对技术的持续扩展构成限制。本文对电力消耗的来源进行了识别和建模。介绍了降低低功率SRAM电池总漏电流的各种技术的实现和所提出的技术。本文观察到,该技术的总漏电流和功耗分别降至52.89 fA和4.75 nW。在Cadence virtuoso 45纳米技术上进行了仿真。
{"title":"Leakage current reduction in finfet based 6T SRAM cell for minimizing power dissipation in nanoscale memories","authors":"Vishal Gupta, V. Gupta, S. Khandelwal, B. Raj, R. Gupta","doi":"10.1109/NUICONE.2015.7449596","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449596","url":null,"abstract":"The power consumption of high performance integrated circuits has increased significantly with technology scaling. Higher power consumption shortens the battery lifetime of portable devices. Furthermore, the increased power consumption poses limitation on the continued technology scaling due to the associated higher power density. In this paper, the sources of power consumption are identified and modeled. Implementation of various techniques and the proposed technique for reducing total leakage current for low power SRAM cell is presented. It is observed in the paper that the total leakage current and power dissipation of the proposed technique is minimized to 52.89 fA and 4.75 nW respectively. Simulations have been performed on Cadence virtuoso 45 nm technologies.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of an intelligent sensor based inspection robot for closed environment 基于智能传感器的封闭环境巡检机器人的研制
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449591
A. Raj
The Inspection of the closed environment may be relevant for improving security and efficiency in industrial plants, These specific operation as inspection, maintenance, cleaning etc. are expensive, thus the application of the robots appears to be one of the most attractive solutions. Recently, in industry duct and ventilation becomes old and many inspection robots were developed in the past. Wired robots put to practical use, but they required heavy power supply. Therefore, a new inspection robot using a wireless communication system is considered useful for inspection of complex and long distance closed environment. A lot of trouble caused by air duct and ventilation like crack, leak and mechanical damage. This Paper describes the development and implementation of inspection robot mounted with an intelligent sensor. In a closed environment, human cannot enter for inspection. So, the main goal was to develop a small inspection robot which can autonomously navigation inside closed environment and measure defect like cracks, leak, mechanical damage and places of the defects inside closed environment. It provides useful information through wireless Zigbee for maintenance. At user end another Zigbee has been received these information and use this information for displayed on GUI.
封闭环境的检查可能与提高工业厂房的安全性和效率有关,这些具体操作如检查,维护,清洁等都是昂贵的,因此机器人的应用似乎是最具吸引力的解决方案之一。近年来,工业管道和通风系统的检测已经过时,过去开发了许多检测机器人。有线机器人投入实际使用,但它们需要大量的电力供应。因此,采用无线通信系统的新型巡检机器人可以用于复杂、远距离封闭环境的巡检。由于风管和通风引起的许多问题,如裂缝,泄漏和机械损坏。本文介绍了安装智能传感器的巡检机器人的研制与实现。在封闭的环境中,人不能进入检查。因此,主要目标是开发一种能够在封闭环境中自主导航的小型检测机器人,并在封闭环境中测量裂纹、泄漏、机械损伤等缺陷以及缺陷的位置。通过无线Zigbee提供有用信息,便于维护。在用户端,另一个Zigbee接收到这些信息,并使用这些信息在GUI上显示。
{"title":"Development of an intelligent sensor based inspection robot for closed environment","authors":"A. Raj","doi":"10.1109/NUICONE.2015.7449591","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449591","url":null,"abstract":"The Inspection of the closed environment may be relevant for improving security and efficiency in industrial plants, These specific operation as inspection, maintenance, cleaning etc. are expensive, thus the application of the robots appears to be one of the most attractive solutions. Recently, in industry duct and ventilation becomes old and many inspection robots were developed in the past. Wired robots put to practical use, but they required heavy power supply. Therefore, a new inspection robot using a wireless communication system is considered useful for inspection of complex and long distance closed environment. A lot of trouble caused by air duct and ventilation like crack, leak and mechanical damage. This Paper describes the development and implementation of inspection robot mounted with an intelligent sensor. In a closed environment, human cannot enter for inspection. So, the main goal was to develop a small inspection robot which can autonomously navigation inside closed environment and measure defect like cracks, leak, mechanical damage and places of the defects inside closed environment. It provides useful information through wireless Zigbee for maintenance. At user end another Zigbee has been received these information and use this information for displayed on GUI.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposed two layer cryptography key generation for off-premise cloud computing 提出了面向外部云计算的两层加密密钥生成方案
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449609
Sunny Bhadlawala, Kajal Chachapara
Data Growth and Data complexity will increase day by day. Present day needs of data will require unstructured and more access will lead to more data backup, audit, security concerns and need of preparing reduplication. Term cloud computing has opened entire new domain of computability, reliability and efficiency for organizations in term of private cloud computing. It can now focus on providing targeted services and overcome challenges to consumers rather than considering infrastructure and resource issues. Nowadays, sharing secure data to another person without authentication and authorization it with can be more and more difficult for the off-premise cloud which leads to some key points like the security of cloud data should be considered, sharing of cloud data as per requirement should be done. This research paper is based on providing some mechanism to allow secure file sharing for off-premise cloud computing among various cloud users. This paper proposes a framework that can be followed easily to share the file using roll management concept which residing on the cloud with another cloud user. In this framework, a concept of cryptography has been used to generate the secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper proposes the secure mechanism of generating key, sharing a key and validating use of the key for given file.
数据增长和数据复杂性日益增加。目前对数据的需求将是非结构化的,更多的访问将导致更多的数据备份、审计、安全问题和准备重复的需求。术语云计算在私有云计算方面为组织打开了可计算性、可靠性和效率的全新领域。它现在可以专注于提供有针对性的服务,克服消费者面临的挑战,而不是考虑基础设施和资源问题。如今,在没有认证和授权的情况下,将安全的数据共享给另一个人对于外部云来说越来越困难,这就需要考虑云数据的安全性,按要求共享云数据等关键点。本研究论文的基础是提供一些机制,以允许在各种云用户之间为外部云计算提供安全的文件共享。本文提出了一个易于遵循的框架,利用卷管理概念将驻留在云上的文件与另一个云用户共享。在这个框架中,使用了密码学的概念来生成可以在用户之间共享的安全密钥。密码学允许对不同的正常文本进行加密和解密,使其成为一些不易解释的密文。本文提出了给定文件生成密钥、共享密钥和验证密钥使用的安全机制。
{"title":"Proposed two layer cryptography key generation for off-premise cloud computing","authors":"Sunny Bhadlawala, Kajal Chachapara","doi":"10.1109/NUICONE.2015.7449609","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449609","url":null,"abstract":"Data Growth and Data complexity will increase day by day. Present day needs of data will require unstructured and more access will lead to more data backup, audit, security concerns and need of preparing reduplication. Term cloud computing has opened entire new domain of computability, reliability and efficiency for organizations in term of private cloud computing. It can now focus on providing targeted services and overcome challenges to consumers rather than considering infrastructure and resource issues. Nowadays, sharing secure data to another person without authentication and authorization it with can be more and more difficult for the off-premise cloud which leads to some key points like the security of cloud data should be considered, sharing of cloud data as per requirement should be done. This research paper is based on providing some mechanism to allow secure file sharing for off-premise cloud computing among various cloud users. This paper proposes a framework that can be followed easily to share the file using roll management concept which residing on the cloud with another cloud user. In this framework, a concept of cryptography has been used to generate the secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper proposes the secure mechanism of generating key, sharing a key and validating use of the key for given file.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thinkers in my classrooms: Teaching critical thinking deductively 课堂上的思考者:演绎式批判性思维教学
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449608
Richa Mishra, K. Kotecha
One of the paradox about humans thinking is that they are not simply the only "logical" animal, they are also the only "illogical" animal among all. They are the only animal that uses meanings - ideas, concepts, analogies, metaphors, models, theories, and explanations - to make sense of things, to understand, predict, and control things. They are also the only animal that uses meanings to negate, contradict, and deceive itself, to misconceive, distort, and stereotype, to become dogmatic, prejudiced and narrow-minded. Humans are the only animal whose thinking can be characterized in terms like clear, precise, accurate, relevant, consistent, profound, and fair; they are also the only animal whose thinking is often imprecise, vague, inaccurate, irrelevant, superficial, trivial, and biased. Critical thinking makes sense in light of this paradoxical dichotomy. Humans shouldn't simply trust their instincts. They shouldn't unquestioningly believe what spontaneously occurs to them. They shouldn't accept as true everything taught as true. They shouldn't assume their experience is unbiased. They need to form, they are not born with, intellectually sound standards for belief, for truth, for validity. They need to cultivate habits and traits which integrate these standards into their lives. It is s possible to achieve this by learning traits of Critical Thinking. Critical thinking is trainable skill. This paper is case-study of the endeavor to teach these skills-deductively to Ist year Engineering students. The multi-disciplinary and radical approach in terms of content and methodology has created inquisitive students with mind more open and thinking more precisely. The papers also show case the evidence of tthat this methodology is successful in inculcating the skill and ability to think critically.
人类思维的一个悖论是,他们不仅是唯一“合乎逻辑”的动物,也是所有动物中唯一“不合逻辑”的动物。人类是唯一一种利用意义——想法、概念、类比、隐喻、模型、理论和解释——来理解事物、理解、预测和控制事物的动物。他们也是唯一一种用意义来否定、反驳和欺骗自己,误解、扭曲和刻板印象,变得教条、偏见和狭隘的动物。人类是唯一一种思维可以被描述为清晰、精确、准确、相关、一致、深刻和公平的动物;人类也是唯一思维不精确、模糊、不准确、不相关、肤浅、琐碎和有偏见的动物。鉴于这种矛盾的二分法,批判性思维是有意义的。人类不应该简单地相信自己的直觉。他们不应该毫无疑问地相信自然而然发生在他们身上的事情。他们不应该把所有教导的都当成是真的。他们不应该认为自己的经验是公正的。他们需要形成,他们不是天生的,智力上合理的信仰,真理,有效性标准。他们需要培养习惯和特质,将这些标准融入他们的生活。通过学习批判性思维的特点是有可能做到这一点的。批判性思维是可训练的技能。本文以工程专业一年级学生为研究对象,探讨如何运用演绎法教授这些技能。在内容和方法方面,多学科和激进的方法培养了求知欲强的学生,他们的思想更开放,思维更精确。这些论文还展示了这种方法在培养批判性思维的技能和能力方面是成功的证据。
{"title":"Thinkers in my classrooms: Teaching critical thinking deductively","authors":"Richa Mishra, K. Kotecha","doi":"10.1109/NUICONE.2015.7449608","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449608","url":null,"abstract":"One of the paradox about humans thinking is that they are not simply the only \"logical\" animal, they are also the only \"illogical\" animal among all. They are the only animal that uses meanings - ideas, concepts, analogies, metaphors, models, theories, and explanations - to make sense of things, to understand, predict, and control things. They are also the only animal that uses meanings to negate, contradict, and deceive itself, to misconceive, distort, and stereotype, to become dogmatic, prejudiced and narrow-minded. Humans are the only animal whose thinking can be characterized in terms like clear, precise, accurate, relevant, consistent, profound, and fair; they are also the only animal whose thinking is often imprecise, vague, inaccurate, irrelevant, superficial, trivial, and biased. Critical thinking makes sense in light of this paradoxical dichotomy. Humans shouldn't simply trust their instincts. They shouldn't unquestioningly believe what spontaneously occurs to them. They shouldn't accept as true everything taught as true. They shouldn't assume their experience is unbiased. They need to form, they are not born with, intellectually sound standards for belief, for truth, for validity. They need to cultivate habits and traits which integrate these standards into their lives. It is s possible to achieve this by learning traits of Critical Thinking. Critical thinking is trainable skill. This paper is case-study of the endeavor to teach these skills-deductively to Ist year Engineering students. The multi-disciplinary and radical approach in terms of content and methodology has created inquisitive students with mind more open and thinking more precisely. The papers also show case the evidence of tthat this methodology is successful in inculcating the skill and ability to think critically.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TCP with sender assisted delayed acknowledgement — A novel ACK thinning scheme 具有发送方辅助延迟确认的TCP——一种新的ACK细化方案
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449610
Hardik K. Molia
TCP - Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios collision is one of the most critical link layer issues which affects overall performance. Inter flow collision occurs among more than one independent TCP connections while Intra flow collision occurs inside a single TCP connection between data flow and ACK flow. ACK Thinning is a process of reducing the rate of ACKs to spare more communication space - bandwidth for the Data flow inside a single TCP connection. This paper introduces an enhanced ACK Thinning scheme SADA - Sender Assisted Delayed Acknowledgement for MANETs. The scheme has been implemented in NS 2.35.
TCP -传输控制协议作为进程间通信的逻辑载体。TCP通过基于ack确认的传输,以流量控制、错误控制和拥塞控制的形式确保可靠性。无线网络具有有限的空间重用范围,这限制了在同一时间内可以在特定地理区域内传输的数据量。在这种情况下,冲突是影响整体性能的最关键的链路层问题之一。流间冲突发生在多个独立的TCP连接之间,而流内冲突发生在数据流和ACK流之间的单个TCP连接内部。ACK稀疏是一种减少ACK速率的过程,目的是为单个TCP连接内的数据流留出更多的通信空间带宽。介绍了一种用于manet的增强ACK细化方案SADA -发送方辅助延迟确认。该方案已在ns2.35中实现。
{"title":"TCP with sender assisted delayed acknowledgement — A novel ACK thinning scheme","authors":"Hardik K. Molia","doi":"10.1109/NUICONE.2015.7449610","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449610","url":null,"abstract":"TCP - Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios collision is one of the most critical link layer issues which affects overall performance. Inter flow collision occurs among more than one independent TCP connections while Intra flow collision occurs inside a single TCP connection between data flow and ACK flow. ACK Thinning is a process of reducing the rate of ACKs to spare more communication space - bandwidth for the Data flow inside a single TCP connection. This paper introduces an enhanced ACK Thinning scheme SADA - Sender Assisted Delayed Acknowledgement for MANETs. The scheme has been implemented in NS 2.35.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANFIS as a controller for fractional order system ANFIS作为分数阶系统的控制器
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449607
Sandip A. Mehta, Khushuben Vasoya, D. Adhyaru
In this paper, design and implementation of Neuro-Fuzzy Algorithm for Fractional Order Controller System has been carried out. Fractional order system and controller has wide application in control word. Simulation study for the fractional order transfer function using different control algorithm has been done. Fractional order system was controlled by ANFIS and Classical PID controller. Comparative analysis between ANFIS and PID has been carried out in this paper. From this analysis it is observed that ANFIS gives better performance.
本文对分数阶控制器系统的神经模糊算法进行了设计与实现。分数阶系统和控制器在控制领域有着广泛的应用。对不同控制算法下的分数阶传递函数进行了仿真研究。分数阶系统采用ANFIS和经典PID控制器进行控制。本文对ANFIS和PID进行了对比分析。从这个分析中可以看出,ANFIS给出了更好的性能。
{"title":"ANFIS as a controller for fractional order system","authors":"Sandip A. Mehta, Khushuben Vasoya, D. Adhyaru","doi":"10.1109/NUICONE.2015.7449607","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449607","url":null,"abstract":"In this paper, design and implementation of Neuro-Fuzzy Algorithm for Fractional Order Controller System has been carried out. Fractional order system and controller has wide application in control word. Simulation study for the fractional order transfer function using different control algorithm has been done. Fractional order system was controlled by ANFIS and Classical PID controller. Comparative analysis between ANFIS and PID has been carried out in this paper. From this analysis it is observed that ANFIS gives better performance.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sensorless speed control of high speed brushed DC motor by model identification and validation 高速有刷直流电动机无传感器速度控制的模型辨识与验证
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449594
S. Kamdar, Harsidh Brahmbhatt, Tigmanshu Patel, M. Thakker
The paper describes an accurate method for speed control medium torque (92.17 mN·m), high speed (9778 RPM) Brushed DC motor without using a physical speed sensor. The back EMF is a representative value for the rotational speed of the motor which has been further used for correlation with speed. Several experiments have been carried out to relate back EMF with speed of the motor rotating a fixed load, no load and variable load. The speed so calculated will generate the error data after comparison with set point. The error is corrected by a discrete PID controller with sampling time of 50 ms, developed in an embedded system. A model of DC motor is identified and validated to determine optimum P, I, D constants and transfer function for accurate speed control. The closed loop system gives an accurate control of DC motor with settling time of 2.45 seconds, peak overshoot of less than 5% and accuracy of speed control less than +/- 1% of full scale.
本文介绍了一种不使用物理速度传感器,对中转矩(92.17 mN·m)、高速(9778 RPM)有刷直流电机进行精确调速的方法。反电动势是电机转速的代表值,它已进一步用于与速度相关。在定载、空载和变载情况下,进行了反电动势与电机转速的关系实验。所计算的速度与设定值比较后会产生误差数据。该误差由嵌入式系统开发的采样时间为50 ms的离散PID控制器进行校正。对直流电机模型进行了辨识和验证,确定了最优的P、I、D常数和传递函数,以实现精确的转速控制。闭环系统精确控制直流电机,稳定时间为2.45秒,峰值超调小于5%,速度控制精度小于满量程的+/- 1%。
{"title":"Sensorless speed control of high speed brushed DC motor by model identification and validation","authors":"S. Kamdar, Harsidh Brahmbhatt, Tigmanshu Patel, M. Thakker","doi":"10.1109/NUICONE.2015.7449594","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449594","url":null,"abstract":"The paper describes an accurate method for speed control medium torque (92.17 mN·m), high speed (9778 RPM) Brushed DC motor without using a physical speed sensor. The back EMF is a representative value for the rotational speed of the motor which has been further used for correlation with speed. Several experiments have been carried out to relate back EMF with speed of the motor rotating a fixed load, no load and variable load. The speed so calculated will generate the error data after comparison with set point. The error is corrected by a discrete PID controller with sampling time of 50 ms, developed in an embedded system. A model of DC motor is identified and validated to determine optimum P, I, D constants and transfer function for accurate speed control. The closed loop system gives an accurate control of DC motor with settling time of 2.45 seconds, peak overshoot of less than 5% and accuracy of speed control less than +/- 1% of full scale.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of SRAM array using 8T cell for low power sensor network 基于8T单元的SRAM阵列低功耗传感器网络设计
Pub Date : 2015-11-01 DOI: 10.1109/NUICONE.2015.7449595
Colin David Karat, K. S. Krishna
The application of sensor networks varies from medical field to the military application. The raw data onto the sensor node is of large quantity and it is necessary to store these data bits. In this paper, design of optimized Static Random Access Memory (SRAM) array for the sensor application is implemented. SRAM cell is designed using 8T. The Half Select Condition Free Cross Point 8T SRAM is modified, using transmission gates as access transistors. By simulation, it is observed that the write-ability is enhanced and reduction in the power dissipation. Apart from the memory cell, the SRAM array has been constructed using the optimized peripheral circuits. Simulations show that reading and writing of data takes place correctly.
传感器网络的应用从医疗领域到军事领域都有不同的应用。传感器节点上的原始数据量很大,需要对这些数据位进行存储。本文针对传感器应用,设计了一种优化的静态随机存取存储器阵列。SRAM单元采用8T设计。对半选择条件自由交叉点8T SRAM进行了改进,使用传输门作为接入晶体管。仿真结果表明,该方法提高了系统的可写性,降低了系统的功耗。除了存储单元外,SRAM阵列还使用优化的外围电路构建。仿真结果表明,数据的读写是正确的。
{"title":"Design of SRAM array using 8T cell for low power sensor network","authors":"Colin David Karat, K. S. Krishna","doi":"10.1109/NUICONE.2015.7449595","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449595","url":null,"abstract":"The application of sensor networks varies from medical field to the military application. The raw data onto the sensor node is of large quantity and it is necessary to store these data bits. In this paper, design of optimized Static Random Access Memory (SRAM) array for the sensor application is implemented. SRAM cell is designed using 8T. The Half Select Condition Free Cross Point 8T SRAM is modified, using transmission gates as access transistors. By simulation, it is observed that the write-ability is enhanced and reduction in the power dissipation. Apart from the memory cell, the SRAM array has been constructed using the optimized peripheral circuits. Simulations show that reading and writing of data takes place correctly.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 5th Nirma University International Conference on Engineering (NUiCONE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1